نتایج جستجو برای: نظریه apos
تعداد نتایج: 43195 فیلتر نتایج به سال:
A novel device n-MISISFET with a 'dielectric stack' instead of the single insulator of n-MOSFET has been described and its characteristics has been obtained in this paper. The desired variation of threshold voltage is obtained with biasing for the novel n-MISISFET for various substrate doping concentrations, the effect temperature variation on various electrical characteristics is stu...
Compte tenu de la difficile soutenabilité budgétaire des systèmes santé, il est capital que les organismes gouvernementaux responsables du budget santé aient un dialogue constructif. Un aspect important planification financière à moyen terme secteur qui nécessite d'adopter une approche stratégique pluriannuelle l’égard budgétisation, et donc ne pas limiter l’établissement sur an. Cela supp...
Au cours des dernières années, de multiples chocs ont menacé la résilience économique et le bien-être dans monde entier. Les administrations publiques pays l’OCDE — les systèmes démocratiques joué un rôle central l’action menée face à ces crises. Si généralement su se montrer hauteur l’urgence l’ampleur défis, leurs capacités risquent s’avérer insuffisantes contexte crises multiples. Pour mieux...
This study aims to determine the improvement of students' ability understand mathematical concepts through application Modification-, Action, Process, Object, and Schema (M-APOS) learning model. The type research conducted is quantitative with a quasi-experimental method. uses design Randomized Pre-test Post-test Control Group Design. population in this was all class VIII at MTsN 2 Kerinci 2018...
Background: Internet of Medical Things (IOMT) has the potential to monitor health continuously and in real-time. One main issues that arise IOMT is how securely data can be transmitted clinical team. In this project, biometric Identity-based encryption was utilized using Fuzzy-IBE (Identity-based encryption) scheme uses face features clinicians create public key. Figure 1 shows testbed setup de...
The development in data mining technology brings serious threat to the individualinformation. The objective of privacy preserving data mining (PPDM) is to safeguard the sensitive information contained in the data. The unwanted disclosure of the sensitive information may happen during the process of data mining results. In this paper we identify four different types of users involved in mining a...
In today's economic environment, enterprises that solely rely on traditional technologies cannot meet dynamic customer demands. Several studies confirm that a nation's growth is dictated, to a large extent, by the performance of small businesses. However, the reality is that SMEs are constantly struggling to survive and maintain their schedule of activities. This is evident in the tra...
Davis, P. J. Interpolation and approximation, Blaisdell New York 1969 Dikshit,H. P. and Rana, S. S. Cubic Interpolatory splines with non uniform Meshes J. Approx. Theory Vol 45, no4(1985) C. A. Hall and Meyer, W. W. ; Optimal error bounds for cubic spline Interpolation J. Approx. Theory, 58 (1989), 59-67. Kopotun K. A. : Univariate spline equivalence of moduli of smoothness and application . Ma...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید